CVE-2022-36359 – django
Package
Manager: pip
Name: django
Vulnerable Version: >=0 <3.2.15 || >=4.0 <4.0.7
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00492 pctl0.6466
Details
Django vulnerable to Reflected File Download attack An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Metadata
Created: 2022-08-11T14:49:12Z
Modified: 2024-12-18T22:08:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-8x94-hmjh-97hq/GHSA-8x94-hmjh-97hq.json
CWE IDs: ["CWE-494"]
Alternative ID: GHSA-8x94-hmjh-97hq
Finding: F086
Auto approve: 1